summaryrefslogtreecommitdiff
path: root/data/apparmor/abstractions/lightdm
Commit message (Collapse)AuthorAgeFilesLines
* Update guest-session AppArmor profile to be suitable for openSUSELaércio de Sousa2015-10-191-2/+4
|
* Allow guest sessions to write in /{,var/}run/screen folder, so they can ↵Laércio de Sousa2015-10-161-0/+1
| | | | launch screen terminals (needed for e.g. Epoptes).
* Allow reading /proc/net/dev from within a guest session.Laércio de Sousa2015-10-151-0/+2
|
* Apply debian/patches/06_apparmor-unix.patch, make note that this requires ↵Robert Ancell2014-10-011-0/+16
| | | | Apparmor 2.9
* Apply debian/patches/07_apparmor-chrome.patch ↵Robert Ancell2014-10-011-1/+6
| | | | debian/patches/08_apparmor-updates.patch
* Allow guest session processes to receive signals from unconfinedTyler Hicks2014-04-071-0/+2
| | | | processes
* Allow guest session processes to read /proc/<PID>/statTyler Hicks2014-04-071-0/+2
|
* Allow guest session processes to signal and ptrace each otherTyler Hicks2014-04-071-0/+4
|
* * Update the AppArmor lightdm abstraction to account for AppArmorTyler Hicks2013-10-281-0/+6
| | | | | | | | | | changes that landed in 13.10 - Allow full access to the system, session, and accessibility buses - Allow trusted helpers, such as dbus-daemon, that are confined by a lightdm session profile, to query AppArmor policy using the .access file in apparmorfs - Include the cups-client abstraction to grant access to the cups socket file
* Install apparmor correctly to fix distcheckRobert Ancell2013-06-131-0/+73